scientific article; zbMATH DE number 1406785
From MaRDI portal
zbMath0939.94555MaRDI QIDQ4940701
Benny Chor, Moni Naor, Amos Fiat
Publication date: 1 March 2000
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
An upper bound on the size of a code with the \(k\)-identifiable parent property, Traceable secret sharing and applications, Improved algorithms for group testing with inhibitors, Protocols for collusion-secure asymmetric fingerprinting, Traitor-tracing from LWE made simple and attribute-based, White box traitor tracing, Strong Hardness of Privacy from Weak Traitor Tracing, Sequential and dynamic frameproof codes, Analysis of properties of \(q\)-ary Reed-Muller error-correcting codes viewed as codes for copyright protection, Pirate decoder for the broadcast encryption schemes from Crypto 2005, Codes for copyright protection: the case of two pirates, New upper bounds for parent-identifying codes and traceability codes, Unnamed Item, Making \textit{any} attribute-based encryption accountable, efficiently, Separation and Witnesses, Equal-Weight Fingerprinting Codes, Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures, Watermarking PRFs against quantum adversaries, New approaches to traitor tracing with embedded identities, Black-box Trace\&Revoke codes, On tight bounds for binary frameproof codes, Complete tree subset difference broadcast encryption scheme and its analysis, Broadcast, trace and revoke with optimal parameters from polynomial hardness, Traitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-Lin, Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation, Hardness of \(k\)-LWE and applications in traitor tracing, Tracing a linear subspace: application to linearly-homomorphic group signatures, Secure and Efficient Construction of Broadcast Encryption with Dealership, Generalization of IPP codes and IPP set systems, Traceability codes and their generalizations, Adaptive multiparty NIKE, Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities, Watermarkable public key encryption with efficient extraction under standard assumptions, Franchised quantum money, Beyond software watermarking: traitor-tracing for pseudorandom functions, Generic construction of trace-and-revoke inner product functional encryption, Tracing quantum state distinguishers via backtracking, On non-binary traceability set systems, Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions, Optimal 2-traceability codes of length 4, Generalized hashing and parent-identifying codes., Wide-sense 2-frameproof codes, Traceability codes, Collusion Resistant Traitor Tracing from Learning with Errors, Constructions of generalized superimposed codes with applications to group testing and conflict resolution in multiple access channels., Improved upper bounds for parent-identifying set systems and separable codes, Adaptively Secure Broadcast Encryption with Dealership, A Note About the Traceability Properties of Linear Codes, Some intriguing upper bounds for separating hash families, Existence and construction of complete traceability multimedia fingerprinting codes resistant to averaging attack and adversarial noise, On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems, Chameleon — A new kind of stream cipher, A note on the security of KHL scheme, ON APPLICATION OF ALGEBRAIC GEOMETRY CODES OF L-CONSTRUCTION IN COPY PROTECTION, Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems, Fighting Pirates 2.0, On traceability property of equidistant codes, Codes with the identifiable parent property for multimedia fingerprinting, A tight bound for frameproof codes viewed in terms of separating hash families, On 2-parent-identifying set systems of block size 4, Fully collusion-resistant traitor tracing scheme with shorter ciphertexts, Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys, New constructions for IPP codes, Tracing Malicious Proxies in Proxy Re-encryption, Union-intersection-bounded families and their applications, Watermarking cryptographic functionalities from standard lattice assumptions, Order-Revealing Encryption and the Hardness of Private Learning, Scalable public-key tracing and revoking, Defending against the Pirate Evolution Attack, Trade-Off Traitor Tracing, Answering $n^2+o(1)$ Counting Queries with Differential Privacy is Hard, Separable collusion-secure multimedia codes, Improved versions of Tardos' fingerprinting scheme, Traitors Collaborating in Public: Pirates 2.0, Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits, A ramp model for distributed key distribution schemes, Intersecting codes and separating codes, Towards accountability in CRS generation, Identity-Based Trace and Revoke Schemes, Privacy-Aware Attribute-Based Encryption with User Accountability, A new key escrow cryptosystem, Secure frameproof codes, key distribution patterns, group testing algorithms and related structures, A class of I.P.P. codes with efficient identification, Synthesizers and their application to the parallel construction of pseudo-random functions, Efficient Traitor Tracing from Collusion Secure Codes, A public-key traitor tracing scheme with revocation using dynamic shares, Collusion resistant watermarkable PRFs from standard assumptions, New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings, Anonymous trace and revoke, A study of the separating property in Reed-Solomon codes by bounding the minimum distance